eBook Description
When talking about vulnerabilities in a switch-based network, the approach is first to describe the protocol, to list the vulnerabilities, and to explain how to prevent or mitigate those vulnerabilities. Because this free cisco ebook also covers techniques to increase a network’s security by using extra features, those features are described and case scenarios are given. When necessary, configuration examples or screen shots are provided.